Become a proficient Linux administrator by learning the art of container networking with elevated efficiency using Docker About This Book * Set up, configure, and monitor a virtual network of containers using a bridge network and virtual switches * Master the skill of networking Docker Containers using frameworks such as Kubernetes, Docker Swarm, and Mesosphere * Acquire hands-on experience through practical examples of Docker networking spanning multiple containers, over multiple hosts, clubbed with various frameworks Who This Book Is For If you are a Linux administrator who wants to learn networking using Docker to ensure the efficient administration of core elements and applications, then this book is for you. Basic knowledge of LXC/Docker is assumed. What You Will Learn * Get to know the basics of networking and see how Docker networking works * Expose the strengths and weaknesses of the current Docker network implementation and third party landscape * Understand Docker networking spanning multiple containers over multiple hosts through practical examples * Observe the pitfalls of Docker networking and how to overcome them * Learn how Docker networking works for Docker Swarm and Kubernetes * Configure Networking using Docker’s container network model (CNM) * Explore OpenvSwitch to connect contain…

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner’s Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. What you will learn Create a wireless lab for your experiments Sniff out wireless packets and hidden networks Capture and crack WPA-2 keys Discover hidden SSIDs Explore the ins and outs of wireless technologies Sniff probe requests and track users through SSID history Attack radius authentication systems Sniff wireless traffic and collect interesting data Decrypt encrypted traffic with stolen keys Descargar / Download

Vagrant is a tool for building complete development environments. With an easy-to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases development/production parity, and makes the “it works on my machine” excuse a thing of the past. “Creating Development Environments with Vagrant” is a practical, hands-on guide that walks you through the functionality of Vagrant, Puppet, and Chef to create powerful and flexible virtual development environments. Create your own virtualization environments containing configurations for different projects so that you can simulate complicated environments that can be easily shared with colleagues to get your projects up and running quickly and effortlessly. “Creating Development Environments with Vagrant” starts with an introduction to virtualization and the concepts behind it, why it’s useful, and an overview of the architecture of Vagrant. We will learn to install Vagrant and get to know its prerequisites. Covering provisioning scripts with Puppet and Chef, learning to use them independently as well as with Vagrant to create a powerful combination. If you want to locally test your projects, juggle multiple projects running on different versions of software, easily share technology requirement changes with colleagues, and, most importantly, want to perform all these tasks efficiently, then this…

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security measure. SELinux System Administration covers the majority of SELinux features through a mix of real-life scenarios, descriptions, and examples. Everything an administrator needs to further tune SELinux to suit their needs are present in this book. This book touches on various SELinux topics, guiding you through the configuration of SELinux contexts, definitions, and the assignment of SELinux roles, and finishes up with policy enhancements. All of SELinux’s configuration handles, be they conditional policies, constraints, policy types, or audit capabilities, are covered in this book with genuine examples that administrators might come across. By the end, SELinux System Administration will have taught you how to configure your Linux system to be more secure, powered by a formidable mandatory access control. What You Will Learn Enable and disable features selectively or even enforce them to a granular level Interpret SELinux logging to make security-conscious decisions Assign new contexts and sensitivity…

You’ve experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you’ll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book’s short, easily-digestible chapters, you’ll learn how to: –Create and delete files, directories, and symlinks –Administer your system, including networking, package installation, and process management –Use standard input and output, redirection, and pipelines –Edit files with Vi, the world’s most popular text editor –Write shell scripts to automate common or boring tasks –Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial “shell shock,” you’ll find that the command line is a natural and expressive way to communicate with your…

By working through the recipes in this book, you can soon be running a more efficient database. Bring your PostreSQL know-how up to date in record time with a hands-on guide that covers all the vital techniques. Administer and maintain a healthy database Monitor your database ensuring that it performs as quickly as possible Tips for backup and recovery of your database In Detail PostgreSQL is a powerful, open source object-relational database system. An enterprise database, PostgreSQL includes features such as Multi-Version Concurrency Control (MVCC), point-in-time recovery, tablespaces, asynchronous replication, nested transactions (savepoints), online/hot backups, a sophisticated query planner/optimizer, and write-ahead logging for fault tolerance. PostgreSQL 9 Admin cookbook covers everything a database administrator needs to protect, manage and run a healthy and efficient PostgreSQL 9.0 database. PostgreSQL 9 Admin Cookbook describes key aspects of the PostgreSQL open source database system. The book covers everything a sysadmin or DBA needs to protect, manage, and run a healthy and efficient PostgreSQL 9 database. This hands-on guide will assist developers working on live databases, supporting web or enterprise software applications using Java, Python, Ruby, or .Net from any development framework. It’s easy to manage your database when you’ve got PostgreSQL…

Authoritative guide to a rapidly growing Linux distribution This is one of the first, if not the first comprehensive guide to the CentOS Linux operating system. Linux guru Tim Bornocyzyk, thoroughly covers the topic whether you’re a Linux novice or a regular who now wants to master this increasingly popular distribution. First find out how to install and configure CentOS. From there, you’ll cover a wealth of Linux and CentOS tools, functions, and techniques, including: how to work in the GNOME and KDE desktop environments; how to use the Linux shell, file system, and text editor; how to configure CUPS printers, Samba for file and printer sharing and other features using GUI tools; and more. CentOS (Community ENTerprise Operating System) is a Linux operating system maintained by a small team of core developers based on Red Hat Enterprise Linux (RHEL) Lead author Christopher Negus is the bestselling Linux author of such books as Fedora 10 and Red Hat Enterprise Linux Bible and Linux 2009 Edition Bible; he is also a member of the Red Hat Enterprise Linux training team Tech edited by key member of the CentOS development team, Ralph Angenendt, and foreword written by lead CentOS developer, Karanbir Singh.…

Debian is one of the most popular Linux-based operating systems, with over 37 thousand software packages available in several architectures. Debian 7 is the latest version of this universal operating system and provides the foundation for thousands of web servers. It is easy to install, stable, and provides mechanisms for system security. Debian 7: System Administration Best Practices provides valuable background information, tips, and advice on the major areas of installing, maintaining, and administering Debian Linux, from single systems to clusters. Learn what makes Debian the most stable and popular Linux distribution for Internet sites. Descargar / Download

What You Will Learn Develop a network-testing environment that can be used to test scanning tools and techniques Understand the underlying principles of network scanning technologies by building custom scripts and tools Perform comprehensive scans to identify listening on TCP and UDP sockets Examine remote services to identify type of service, vendor, and version Evaluate denial of service threats and develop an understanding of how common denial of service attacks are performed Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them Descargar / Download